CN108540524A - A kind of method, equipment and readable medium for establishing social networks - Google Patents
A kind of method, equipment and readable medium for establishing social networks Download PDFInfo
- Publication number
- CN108540524A CN108540524A CN201810146001.5A CN201810146001A CN108540524A CN 108540524 A CN108540524 A CN 108540524A CN 201810146001 A CN201810146001 A CN 201810146001A CN 108540524 A CN108540524 A CN 108540524A
- Authority
- CN
- China
- Prior art keywords
- user
- target zone
- good friend
- social networks
- users
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/52—Network services specially adapted for the location of the user terminal
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63F—CARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
- A63F13/00—Video games, i.e. games using an electronically generated display having two or more dimensions
- A63F13/85—Providing additional services to players
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/01—Social networking
Abstract
This application provides a kind of methods, equipment and readable medium for establishing social networks, first obtain the location information of the first user, then, the first selected operation based on the first user and the location information, determine target zone, then addition good friend's request is sent to one or more of target zone second user, in the agreement addition good friend's response for receiving second user transmission, will has sent and agree to that the second user of addition good friend's response is set as good friend.Addition good friend's request can be sent to one or more of the first arbitrary target range set by user second user, to realize that first user's random disposable addition batch adds the purpose of good friend.
Description
Technical field
This application involves internet information treatment technology and field of computer technology more particularly to a kind of social passes of foundation
Method, equipment and the readable medium of system.
Background technology
With the development of electronic technology, the function of electronic equipment is more and more abundant, installable in electronic equipment to apply journey
Sequence is more and more.For most application program, even if such as game, communication, social network sites etc., can utilize and apply account
It is logged on in corresponding server by application program, and the different application account of same application directly can also mutually be built up
Friendly relationship, so as in good friend account of the display interface of the application program of the electronic equipment output with friend relation, pass through
Application server can both be communicated with arbitrary good friend's account.
In the prior art, the user that establishes of friend relation needs to ask to determining user account transmission addition good friend
It asks, that is to say, that addition good friend's request is sent by user account of the point-to-point mode into an application program.
Invention content
It, can be in view of this, the embodiment of the present application provides a kind of method, equipment and readable medium for establishing social networks
Addition good friend's request is sent to a or multiple second user of the first target zone set by user, may be implemented quickly with multiple
Target second user establishes the purpose of social networks.
The embodiment of the present application uses following technical proposals:
The embodiment of the present application provides a kind of method for establishing social networks, including:
Obtain location information and the first selected operation of the first user;
The first selected operation based on first user and the location information, determine target zone;
One or more second users into the target zone send addition good friend's request.
Preferably, it is established in the method for social networks in above-mentioned, the location information includes:First user is answering
With any one in the geographical location of the terminal of coordinate information and the operation application program in program.
Preferably, established in the method for social networks in above-mentioned, the selected operation of first based on first user and
The location information determines target zone, including:
When the described first selected operation is selected orientation operation, the target zone is using the location information as basic point
The range determined towards selected orientation.
Preferably, established in the method for social networks in above-mentioned, the selected operation of first based on first user and
The location information, determines target zone, further includes:
The first selected operation based on first user, behind selected orientation, then determines radius of target;
It is radius and towards selected orientation that the target zone, which is by basic point, the radius of target of the location information,
Determining range.
Preferably, established in the method for social networks in above-mentioned, the selected operation of first based on first user and
The location information determines target zone, including:
The first selected operation based on first user, determines destination path;
The target zone is determined by radius centered on the every bit in the destination path, using the numerical value set
Range.
Preferably, established in the method for social networks in above-mentioned, the selected operation of first based on first user and
The location information determines target zone, including:
The first selected operation based on first user, middle at least one point of interest of determination;
The target zone is the range that the coverage area of at least one point of interest determines.
Preferably, established in the method for social networks in above-mentioned, the selected operation of first based on first user and
The location information determines the target zone, including:
The second selected operation based on first user, determines first object range;
Obtain all hot spots in the first object range;
The selected operation of third based on first user, selects at least one hot spot from all hot spots, described
The radiation scope of at least one hot spot is the target zone.
Preferably, it is established in the method for social networks in above-mentioned, in one or more the into the target zone
After two users send addition good friend's request, first object notification information is sent to first user.
Preferably, it is established in the method for social networks in above-mentioned, further includes:
Shield the addition good friend request that one or more second users in the target zone are sent.
Preferably, it is established in the method for social networks in above-mentioned, shields one or more the in the target zone
The addition good friend request that two users send, including:
When receiving the addition good friend request that one or more second users are sent, one or more of second are judged
Whether user is in the target zone;
If so, shielding the addition good friend request that one or more of second users are sent.
Preferably, it is established in the method for social networks in above-mentioned, shields one or more the in the target zone
The addition good friend that two users send asks, and further includes:
If one or more of second users not in the target zone, judge that one or more of second use
Whether in blacklist, the blacklist is first user setting at family;
If in the blacklist, the addition good friend request that one or more of second users are sent is shielded.
Preferably, it is established in the method for social networks in above-mentioned, in the target zone described in preset time inner shield
The addition good friend request that one or more second users are sent.
Preferably, it is established in the method for social networks in above-mentioned, is shielding the one or more in the target zone
After the addition good friend request that second user is sent, the second goal notification information is sent to first user.
Also a kind of equipment for establishing social networks of the application, the equipment includes for storing depositing for computer program instructions
Reservoir and processor for executing program instructions, wherein when the computer program instructions are executed by the processor, triggering should
Equipment executes the process described above.
The application more provides a kind of computer-readable medium, and the media storage has computer-readable instruction, the meter
Calculation machine readable instruction can be executed by processor to realize method as described above.
Above-mentioned at least one technical solution that the embodiment of the present application uses can reach following advantageous effect:First obtain first
The location information of user, then, the specified operation based on user and the location information determine target zone, then to described
One or more of target zone second user sends addition good friend's request, is receiving one or more of second users
When agreement addition good friend's response of transmission, one or more second users setting of agreement addition good friend's response will be had sent preferably
Friend.It is added that is, can be sent to one or more of the first arbitrary target range set by user second user
Friend's request, to realize that first user's random disposable addition batch adds the purpose of good friend.
Description of the drawings
Attached drawing described herein is used for providing further understanding of the present application, constitutes part of this application, this Shen
Illustrative embodiments and their description please do not constitute the improper restriction to the application for explaining the application.In the accompanying drawings:
Fig. 1 is a kind of flow diagram of method that establishing social networks provided by the embodiments of the present application;
Fig. 2 is the process for establishing social networks in one embodiment of the application in gaming;
Fig. 3 is the process for shielding second user in one embodiment of the application in gaming;
Fig. 4 is the flow chart for the method that social networks are established in one embodiment of the application;
Fig. 5 is the flow chart of step S408 in Fig. 4.
Specific implementation mode
To keep the purpose, technical scheme and advantage of the application clearer, below in conjunction with the application specific embodiment and
Technical scheme is clearly and completely described in corresponding attached drawing.Obviously, described embodiment is only the application one
Section Example, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not doing
Go out the every other embodiment obtained under the premise of creative work, shall fall in the protection scope of this application.
Below in conjunction with attached drawing, the technical solution that each embodiment of the application provides is described in detail.
The embodiment of the present application provides a kind of method for establishing social networks, if shown in 1, Fig. 1 is the embodiment of the present application
A kind of flow diagram of the method that establishing social networks provided.The method for establishing social networks includes:Obtain first
The location information of user and the first selected operation, as shown in the step S101 in Fig. 1;First based on first user is selected
Operation and the location information, determine target zone, as shown in the step S103 in Fig. 1;One into the target zone
Or multiple second users send addition good friend's request, as shown in the step S105 in Fig. 1.
Step S101 obtains location information and the first selected operation of the first user.
The location information includes:The coordinate information of first user in the application and the operation application program
Terminal geographical location in any one.Specifically, the location information of first user includes but not limited to described
The geographical location of the terminal of coordinate information and the operation application program of first user in the application program.
For example, in one embodiment of the application, in a kind of game, the location information of first user can be game
In map in coordinate information.Further for example, in the another embodiment of the application, in social networking application program, described first uses
The location information at family is coordinate information of first user in the map of social networking application program, at this point, the in social networking application program
The coordinate information of one user is identical with the geographical location information for the terminal that social networking application program is run, that is, at this point, described first
The location information of user is the coordinate information of map in the terminal.
Step S103, the first selected operation based on first user and the location information, determine target zone.
When the location information of first user is the coordinate information of first user in the application, it is based on institute
The first selected operation and the coordinate information of first user in the application for stating the first user, determine and apply journey described
Target zone in sequence.
In one embodiment of the application, when the described first selected operation is selected orientation operation, the target zone is
Using the range that the location information is determined as basic point towards selected orientation, the first selected operation based on first user,
Target bearing is determined in the application program.Specifically, in one embodiment of the application, first user is in the application
In program, target bearing is drawn centered on the location information.First based on first user selected operation and described
Location information determines the target zone, including:The target bearing and location information drawn based on first user, determines institute
Target zone is stated,
For example, when the application program is a game, specifically, for example in a kind of game, with first user
Location information centered on, first user can draw straight line in the map of game, then with first user's
Location information is starting point, and the straight line drawn along the first user is the target zone.
Further for example, in a kind of game, it, can also be in the map of game centered on the location information of first user
In draw two straight lines, the location information of this two straight lines and first user forms a sector region, the fan section
Domain is the target zone.
In the another embodiment of the application, first user can also input target bearing in the application program.
The first selected operation based on first user and the location information, determine the target zone, including:Based on described
One target bearing input by user and the location information, determine the target zone.
That is, first user not only can draw target bearing in the application program, it can also be in institute
It states and inputs the target bearing in application program, for example, in gaming, the first user can be in the input frame in interface
Directly input the coordinate information on the boundary of the target zone.
Further, in the another embodiment of the application, the first selected operation based on first user, described
Radius of target is set in application program.That is, first user inputs the radius of target in the application program.
I.e. described first user can also input radius of target in the application.According to the target bearing, the radius of target with
And the location information of first user determines the target zone.That is, behind selected orientation, further according to the mesh of setting
Radius is marked, the target zone is determined according to selected orientation and the radius of target, specifically, the target zone is with institute
State the range that location information is basic point, the radius of target is radius and is determined towards selected orientation.
In the another embodiment of the application, it can also be answered described according to the first of first user the selected operation
With destination path is determined in program, the target zone is determined according to the destination path.Specifically, can be by the target road
The range that diameter is covered is set as the target zone.In other embodiments, the destination path can also nearby be set
Region in range is set as the target zone.When the setting range can be with the every bit in the destination path
Centered on, using the numerical value set as region determined by radius.The numerical value of setting can be the arbitrary numerical value more than or equal to 0.
In the another embodiment of the application, the first selected operation based on first user, in the application program
Middle at least one point of interest of determination (Point of Information, POI), the point of interest, which refers to all, can be abstracted as a little
Geographic object.That is, the first user can select in the application program at least onely in the application program
Object is managed, for example, a castle, a fort and a piece of forest etc..The coverage area of at least one point of interest is
For the target zone.
Step S105, one or more second users into the target zone send addition good friend's request.
After determining the target zone, one or more second users transmission into the target zone is added
Friend's request.Specifically, in the application program, then to one or more of target zone second user corresponding
One user sends addition good friend's request.
Further, after one or more second users into the target zone send addition good friend's request,
First object notification information is sent to first user, to notify its one in target zone described in warp-wise of the first user
Or multiple second users send addition good friend's request.For example, when 45 ° of the north by east side that the target zone is first user
" one or more the on your 45 ° of north by east direction can be presented to, the first object notification information in the form of following
Two users send addition good friend request ".Certainly, in the other embodiment of the application, the first object notification information may be used also
To be to present otherwise, such as notify first user in the form of speech, etc..
When receiving agreement addition good friend's response that the second user in the target zone is sent, agreement will be had sent
The second user of addition good friend's response is set as good friend.
Further, after determining the target zone, one or more that not only can be into the target zone
Second user sends addition good friend's request, while can also shield the transmission of one or more second users in the target zone
Addition good friend request.Specifically, in the application program, the one or more second in the target zone can be shielded
The addition good friend request that user sends.
After masking the addition good friend request that one or more second users in the target zone are sent, described the
The addition good friend that one user sends the one or more second users not received in the target zone asks.And can also
The second goal notification information is sent to first user, to notify first user to mask in the target zone
One or more second users.In one embodiment of the application, for example, when the target zone is in front of first user
A piece of forest, the second goal notification information can be in the following manner present " shielded you front forest in one
Or multiple second users ".
Next, describing to establish the flow of the method for social networks respectively with two specific scenes.As shown in Fig. 2,
Fig. 2 is the process for establishing social networks in one embodiment of the application in gaming.
Step S202 obtains coordinate information of first user in the map of game.
Step S204, the first selected operation based on first user and the coordinate information, determine target zone.
Specifically, in one embodiment of the application, the first selected operation based on first user, in the map of game
One point of interest of middle determination.For example, the first user selects a castle in the map of game.The coverage area of the castle is
For the target zone.
Step S206 sends addition good friend's request to one or more of castle second user.
Step S208, to the first user send first object notification information " with one into your selected castle or
Multiple second users send addition good friend request ".
Fig. 3 is the process for shielding second user in one embodiment of the application in gaming.
Step S301 obtains coordinate information of first user in the map of game.
Coordinate information of first user in the map of game is the location information of first user.
Step S303, the first selected operation based on first user and the coordinate information, determine target zone.
Specifically, in the embodiment of the present application, it is 30 ° to 50 ° of north by east, target that first user, which inputs target bearing,
Radius is 5 kilometers, and therefore, the first selected operation based on first user determines in the map of game with described first
Centered on the coordinate information of user, 30 ° to 50 ° of north by east, the region that radius of target is covered by 5 kilometers is the target model
It encloses.
Step S305 shields the addition good friend request that one or more second users in the target zone are sent.
Specifically, when receiving the addition good friend request that one or more of second users are sent, described one is judged
Whether a or multiple second users are in the target zone determined by step S303.If in the target zone, shield
Cover the addition good friend request transmitted by one or more of second users.
If not in the target zone, further judge one or more of second users whether in blacklist
In, the blacklist is first user setting.If one or more of second users are shielded in the blacklist
Cover the addition good friend request that one or more of second users are sent.If not in the blacklist, described one is not shielded
The addition good friend request that a or multiple second users are sent.
Further, in the application some embodiments, a preset time can also be set, is only shielded in preset time
State the addition good friend request of the transmission of one or more second users in target zone in covert.When beyond the preset time,
Then receive the addition good friend request that one or more of second users are sent.Specifically, when first user determines institute
It states target zone and starts timing, after timing is more than the preset time, just receive the one or more in the target zone
The addition good friend request that second user is sent.
Step S307 sends the second goal notification information " to shield 30 ° to 50 ° of north by east, target to you to the first user
Radius is one or more second users in 5 kilometer ranges ".
In one embodiment of the application, the method for establishing social networks further includes:It obtains and runs first user
The geographical location information of the terminal of owning application judges the location information of first user and the geographical position of the terminal
Whether confidence breath is identical, if identical, the geographical location of the first selected operation and the terminal based on first user is believed
Breath, determines the target zone, then rethinks the transmission addition good friend of one or more second users in the target zone and asks
It asks.
Specifically, as shown in figure 4, Fig. 4 is the flow chart for the method for establishing social networks in one embodiment of the application.
Step S402 obtains the location information of the first user.
The location information of first user in the application as described in being obtained the detailed process in figure step S101.
Step S404 obtains the geographical location information for the terminal for running the first user owning application.
Specifically, first user is the account in application program, in other words, first user is to be applied at one
The account information registered in program, certainly, the account information may include and be not limited to the head portrait of the first user, name on account
Etc..
The application program is run in a terminal, obtains the geographical location information of the terminal..In one embodiment of the application
In, the geographical location information of the terminal is generally the GPS positioning information of the terminal.
Step S406 judges that the coordinate information of first user in the application and the geographical location of the terminal are believed
Whether breath is identical.
Specifically, when the map of the first user owning application is using GPS map, then described first
The coordinate information of user in the application is with the geographical location information of the terminal with regard to identical.It answers belonging to first user
Virtual map is used with program, for example, in the confrontation game of simulation, the coordinate letter of first user in the application
It ceases and is just differed with the geographical location information of the terminal.
If the coordinate information of first user in the application is identical as the geographical location information of the terminal, base
In the geographical location information that the first of first user selectes operation and the terminal, the target zone is determined, in Fig. 4
Step S408.Otherwise, the first selected operation based on first user and the seat of first user in the application
Information is marked, the target zone is determined, such as the step S410 in Fig. 4.
Step S412 sends addition good friend's request to one or more of target zone second user.
Step S414 sends first object notification information " one into target zone or more to first user
A second user sends addition good friend request ".
In one embodiment of the application, in step S408, the first selected operation based on first user and the end
The geographical location information at end determines the target zone, can be determined in the following manner, as shown in figure 5, Fig. 5 is Fig. 4
The flow chart of middle step S408.
Step S501, the second selected operation based on first user, determines first object range.
Specifically, the second selected operation based on first user, the first user input is with the terminal device
Geographical location information centered on pre-set radius.Centered on the geographical location information of the terminal, the pre-set radius is
Radius forms the first object range.
First pre-set radius input by user may be greater than zero any number, such as can be 10 meters, and 2
Rice, 500 meters, the numerical value such as 1000 meters and 5000m.Details are not described herein.
Step S503 obtains all hot spots in the first object range.
Step S505, the selected operation of the third based on first user, selects at least one from all hot spots
Hot spot.
In this step, first user can select a hot spot, can also select multiple hot spots.
The radiation scope of at least one hot spot is the target zone.
Step S507 sends addition good friend's request to one or more of target zone second user.
Addition good friend's request is sent to the every other terminal for being connected at least one hot spot.
Certainly, in the embodiment of the present application, one or more of target zone second user hair can also be shielded
The addition good friend request sent.
It should be noted that identified target zone can be not only at least one heat in step S408 and S410
The covered range of point, can also be any one point of interest in map, is also can also be certainly based on first user
The first selected operation determined by any one direction or range.
It is described to set the embodiment of the present application also provides a kind of equipment for establishing social networks based on the same inventive concept
Standby includes the memory for storing computer program instructions and the processor for executing program instructions, wherein when the calculating
When machine program instruction is executed by the processor, triggers the equipment and execute the process described above.
Based on the same inventive concept, the embodiment of the present application also provides a kind of computer-readable medium, the medium is deposited
Computer-readable instruction is contained, the computer-readable instruction can be executed by processor to realize method as described above.
In the method, equipment and readable medium of the establishing social networks that provide in the embodiment of the present application, is first obtained
The location information of one user, then, the first selected operation based on the first user and the location information determine target zone,
Then addition good friend's request is sent to one or more of target zone second user, is sent receiving second user
Agreement addition good friend response when, will have sent agree to addition good friend response second user be set as good friend.That is, can
To send addition good friend's request to one or more of the first arbitrary target range set by user second user, to realize
First user's random disposable addition batch adds the purpose of good friend.
In the 1990s, the improvement of a technology can be distinguished clearly be on hardware improvement (for example,
Improvement to circuit structures such as diode, transistor, switches) or software on improvement (improvement for method flow).So
And with the development of technology, the improvement of current many method flows can be considered as directly improving for hardware circuit.
Designer nearly all obtains corresponding hardware circuit by the way that improved method flow to be programmed into hardware circuit.Cause
This, it cannot be said that the improvement of a method flow cannot be realized with hardware entities module.For example, programmable logic device
(Programmable Logic Device, PLD) (such as field programmable gate array (Field Programmable Gate
Array, FPGA)) it is exactly such a integrated circuit, logic function determines device programming by the first user.By designing
Personnel, which voluntarily program, to come a digital display circuit " integrated " on a piece of PLD, without asking chip maker designing and
Make dedicated IC chip.Moreover, nowadays, substitution manually makes IC chip, and this programming also changes mostly
It is realized with " logic compiler (logic compiler) " software, software compiler phase used when it writes with program development
It is similar, and the source code before compiling also write by handy specific programming language, this is referred to as hardware description language
(Hardware Description Language, HDL), and HDL is also not only a kind of, but there are many kind, such as ABEL
(Advanced Boolean Expression Language)、AHDL(Altera Hardware Description
Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL
(Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby
Hardware Description Language) etc., VHDL (Very-High-Speed are most generally used at present
Integrated Circuit Hardware Description Language) and Verilog.Those skilled in the art also answer
This understands, it is only necessary to method flow slightly programming in logic and is programmed into integrated circuit with above-mentioned several hardware description languages,
The hardware circuit for realizing the logical method flow can be readily available.
Controller can be implemented in any suitable manner, for example, controller can take such as microprocessor or processing
The computer for the computer readable program code (such as software or firmware) that device and storage can be executed by (micro-) processor can
Read medium, logic gate, switch, application-specific integrated circuit (Application Specific Integrated Circuit,
ASIC), the form of programmable logic controller (PLC) and embedded microcontroller, the example of controller includes but not limited to following microcontroller
Device:ARC 625D, Atmel AT91SAM, Microchip PIC18F26N20 and Silicone Labs C8051F320, are deposited
Memory controller is also implemented as a part for the control logic of memory.It is also known in the art that in addition to
Pure computer readable program code mode is realized other than controller, can be made completely by the way that method and step is carried out programming in logic
Controller is obtained in the form of logic gate, switch, application-specific integrated circuit, programmable logic controller (PLC) and embedded microcontroller etc. to come in fact
Existing identical function.Therefore this controller is considered a kind of hardware component, and to including for realizing various in it
The device of function can also be considered as the structure in hardware component.Or even, it can will be regarded for realizing the device of various functions
For either the software module of implementation method can be the structure in hardware component again.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity,
Or it is realized by the product with certain function.It is a kind of typically to realize that equipment is computer.Specifically, computer for example may be used
Think personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media play
It is any in device, navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or these equipment
The combination of equipment.
For convenience of description, it is divided into various units when description apparatus above with function to describe respectively.Certainly, implementing this
The function of each unit is realized can in the same or multiple software and or hardware when application.
It should be understood by those skilled in the art that, the embodiment of the present invention can be provided as method, system or computer program
Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention
Apply the form of example.Moreover, the present invention can be used in one or more wherein include computer usable program code computer
The computer program production implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)
The form of product.
The present invention be with reference to according to the method for the embodiment of the present invention, the flow of equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that can be realized by computer program instructions every first-class in flowchart and/or the block diagram
The combination of flow and/or box in journey and/or box and flowchart and/or the block diagram.These computer programs can be provided
Instruct the processor of all-purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine so that the instruction executed by computer or the processor of other programmable data processing devices is generated for real
The device for the function of being specified in present one flow of flow chart or one box of multiple flows and/or block diagram or multiple boxes.
These computer program instructions, which may also be stored in, can guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works so that instruction generation stored in the computer readable memory includes referring to
Enable the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one box of block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device so that count
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, in computer or
The instruction executed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one
The step of function of being specified in a box or multiple boxes.
In a typical configuration, computing device includes one or more processors (CPU), input/output interface, net
Network interface and memory.
Memory may include computer-readable medium in volatile memory, random access memory (RAM) and/or
The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium
Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology realizes information storage.Information can be computer-readable instruction, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moves
State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable
Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM),
Digital versatile disc (DVD) or other optical storages, magnetic tape cassette, tape magnetic disk storage or other magnetic storage apparatus
Or any other non-transmission medium, it can be used for storage and can be accessed by a computing device information.As defined in this article, it calculates
Machine readable medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability
Including so that process, method, commodity or equipment including a series of elements include not only those elements, but also wrap
Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that wanted including described
There is also other identical elements in the process of element, method, commodity or equipment.
The application can describe in the general context of computer-executable instructions executed by a computer, such as program
Module.Usually, program module includes routines performing specific tasks or implementing specific abstract data types, program, object, group
Part, data structure etc..The application can also be put into practice in a distributed computing environment, in these distributed computing environments, by
Task is executed by the connected remote processing devices of communication network.In a distributed computing environment, program module can be with
In the local and remote computer storage media including storage device.
Each embodiment in this specification is described in a progressive manner, identical similar portion between each embodiment
Point just to refer each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality
For applying example, since it is substantially similar to the method embodiment, so description is fairly simple, related place is referring to embodiment of the method
Part explanation.
Above is only an example of the present application, it is not intended to limit this application.For those skilled in the art
For, the application can have various modifications and variations.It is all within spirit herein and principle made by any modification, equivalent
Replace, improve etc., it should be included within the scope of claims hereof.
Claims (15)
1. a kind of method for establishing social networks, which is characterized in that including:
Obtain location information and the first selected operation of the first user;
The first selected operation based on first user and the location information, determine target zone;
One or more second users into the target zone send addition good friend's request.
2. the method according to claim 1 for establishing social networks, which is characterized in that the location information includes:It is described
The coordinate information of first user in the application and any one in the geographical location for the terminal for running the application program.
3. the method according to claim 2 for establishing social networks, which is characterized in that first based on first user
Selected operation and the location information, determine target zone, including:
When the described first selected operation is selected orientation operation, the target zone be using the location information as basic point towards
The range that selected orientation determines.
4. the method according to claim 3 for establishing social networks, which is characterized in that first based on first user
Selected operation and the location information, determine target zone, further include:
The first selected operation based on first user, behind selected orientation, then determines radius of target;
The target zone is to be radius using the location information as basic point, the radius of target and determined towards selected orientation
Range.
5. the method according to claim 2 for establishing social networks, which is characterized in that first based on first user
Selected operation and the location information, determine target zone, including:
The first selected operation based on first user, determines destination path;
The target zone is centered on the every bit in the destination path, using the numerical value set as model determined by radius
It encloses.
6. the method according to claim 2 for establishing social networks, which is characterized in that first based on first user
Selected operation and the location information, determine target zone, including:
The first selected operation based on first user, determines at least one point of interest;
The target zone is the range that the coverage area of at least one point of interest determines.
7. the method according to claim 2 for establishing social networks, which is characterized in that including:
The first selected operation based on first user and the location information, determine the target zone, including:
The second selected operation based on first user, determines first object range;
Obtain all hot spots in the first object range;
The selected operation of third based on first user, selects at least one hot spot from all hot spots, it is described at least
The radiation scope of one hot spot is the target zone.
8. the method according to claim 1 for establishing social networks, which is characterized in that in one into the target zone
After a or multiple second users send addition good friend's request, first object notification information is sent to first user.
9. the method according to claim 1 for establishing social networks, which is characterized in that further include:
Shield the addition good friend request that one or more second users in the target zone are sent.
10. the method according to claim 9 for establishing social networks, which is characterized in that shield in the target zone
The addition good friend request that one or more second users are sent, including:
When receiving the addition good friend request that one or more second users are sent, one or more of second users are judged
Whether in the target zone;
If so, shielding the addition good friend request that one or more of second users are sent.
11. the method according to claim 10 for establishing social networks, which is characterized in that shield in the target zone
The addition good friend that one or more second users are sent asks, and further includes:
If one or more of second users not in the target zone, judge that one or more of second users are
It is no in blacklist, the blacklist is first user setting;
If in the blacklist, the addition good friend request that one or more of second users are sent is shielded.
12. the method according to claim 9 for establishing social networks, which is characterized in that described in preset time inner shield
The addition good friend request that one or more second users in target zone are sent.
13. the method according to claim 9 for establishing social networks, which is characterized in that shielding in the target zone
One or more second users send addition good friend request after, to first user send the second goal notification letter
Breath.
14. a kind of equipment for establishing social networks, the equipment includes the memory and use for storing computer program instructions
In the processor executed program instructions, wherein when the computer program instructions are executed by the processor, trigger equipment execution
Method described in any one of claim 1 to 13.
15. a kind of computer-readable medium, the media storage has computer-readable instruction, the computer-readable instruction can quilt
Processor is executed to realize the method as described in any one of claim 1 to 13.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810146001.5A CN108540524B (en) | 2018-02-12 | 2018-02-12 | Method, equipment and readable medium for establishing social relationship |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810146001.5A CN108540524B (en) | 2018-02-12 | 2018-02-12 | Method, equipment and readable medium for establishing social relationship |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108540524A true CN108540524A (en) | 2018-09-14 |
CN108540524B CN108540524B (en) | 2022-01-25 |
Family
ID=63486027
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810146001.5A Active CN108540524B (en) | 2018-02-12 | 2018-02-12 | Method, equipment and readable medium for establishing social relationship |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108540524B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109876442A (en) * | 2019-04-15 | 2019-06-14 | 网易(杭州)网络有限公司 | Route indicating means, equipment and storage medium in game based on map |
CN111597455A (en) * | 2020-04-29 | 2020-08-28 | 腾讯科技(深圳)有限公司 | Social relationship establishing method and device, electronic equipment and storage medium |
CN112819480A (en) * | 2019-10-30 | 2021-05-18 | 腾讯科技(深圳)有限公司 | Data processing method, device and storage medium |
CN113099025A (en) * | 2021-03-01 | 2021-07-09 | 上海掌门科技有限公司 | Method and device for adding friends in social application |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140269657A1 (en) * | 2013-03-14 | 2014-09-18 | Samsung Electronics Co., Ltd. | Method and apparatus for friend discovery |
CN104333567A (en) * | 2013-07-22 | 2015-02-04 | 思科技术公司 | Web caching with security as a service |
CN104468329A (en) * | 2014-12-02 | 2015-03-25 | 小米科技有限责任公司 | Member adding method and device based on instant messaging |
CN105933863A (en) * | 2016-04-15 | 2016-09-07 | 北京搜狗科技发展有限公司 | Friend adding method and device and electronic equipment |
CN107079066A (en) * | 2016-10-19 | 2017-08-18 | 深圳市大疆创新科技有限公司 | Control method, control device and electronic installation |
-
2018
- 2018-02-12 CN CN201810146001.5A patent/CN108540524B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140269657A1 (en) * | 2013-03-14 | 2014-09-18 | Samsung Electronics Co., Ltd. | Method and apparatus for friend discovery |
CN104333567A (en) * | 2013-07-22 | 2015-02-04 | 思科技术公司 | Web caching with security as a service |
CN104468329A (en) * | 2014-12-02 | 2015-03-25 | 小米科技有限责任公司 | Member adding method and device based on instant messaging |
CN105933863A (en) * | 2016-04-15 | 2016-09-07 | 北京搜狗科技发展有限公司 | Friend adding method and device and electronic equipment |
CN107079066A (en) * | 2016-10-19 | 2017-08-18 | 深圳市大疆创新科技有限公司 | Control method, control device and electronic installation |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109876442A (en) * | 2019-04-15 | 2019-06-14 | 网易(杭州)网络有限公司 | Route indicating means, equipment and storage medium in game based on map |
CN112819480A (en) * | 2019-10-30 | 2021-05-18 | 腾讯科技(深圳)有限公司 | Data processing method, device and storage medium |
CN112819480B (en) * | 2019-10-30 | 2023-06-09 | 腾讯科技(深圳)有限公司 | Data processing method, device and storage medium |
CN111597455A (en) * | 2020-04-29 | 2020-08-28 | 腾讯科技(深圳)有限公司 | Social relationship establishing method and device, electronic equipment and storage medium |
CN111597455B (en) * | 2020-04-29 | 2024-03-01 | 腾讯科技(深圳)有限公司 | Social relation establishing method and device, electronic equipment and storage medium |
CN113099025A (en) * | 2021-03-01 | 2021-07-09 | 上海掌门科技有限公司 | Method and device for adding friends in social application |
CN113099025B (en) * | 2021-03-01 | 2023-06-27 | 上海掌门科技有限公司 | Method and device for adding friends in social application |
Also Published As
Publication number | Publication date |
---|---|
CN108540524B (en) | 2022-01-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR102495686B1 (en) | Geo-fence valuation system | |
TWI698795B (en) | Information display method and device | |
CN108540524A (en) | A kind of method, equipment and readable medium for establishing social networks | |
CN104602185B (en) | A kind of localization method and device | |
US20120066138A1 (en) | User affinity concentrations as social topography | |
CN105052078A (en) | Extending routing rules from external services | |
CN103069370A (en) | Methods, apparatuses and computer program products for automatically generating suggested information layers in augmented reality | |
CN107426272A (en) | A kind of small routine method for pushing, device and computer-readable storage medium | |
CN110020912B (en) | Page display method, device and equipment | |
CN109214632A (en) | A kind of risk control method and equipment | |
CN108229939A (en) | A kind of method, apparatus and equipment for sending and receiving electronics red packet | |
CN109426732A (en) | A kind of data processing method and device | |
CN110022227A (en) | Method for processing business, device, equipment and storage medium | |
CN108566615A (en) | Information-pushing method, device and client | |
TWI742332B (en) | Information push method, device and equipment | |
CN109271587A (en) | A kind of page generation method and device | |
Stach | How to assure privacy on android phones and devices? | |
US10341813B2 (en) | Anonymizing location data | |
CN108074009A (en) | Motion route generation method and device, mobile terminal and server | |
CN106331048A (en) | Data processing method, apparatus and system, and mobile device | |
CN108572979A (en) | A kind of position service method and device, a kind of device for location-based service | |
CN107623897B (en) | Geography fence generation method and its equipment | |
CN109144600A (en) | A kind of operation method of application program, equipment and computer-readable medium | |
CN106156050A (en) | A kind of data processing method and device | |
US11122437B2 (en) | Detection of GPS spoofing using wireless network visibility to mobile devices |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |